NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Lee, Jae-Kwan – Internet Research, 2003
A model for monitoring the Web site development process in the public sector is proposed and tested empirically with a sample of local government Web sites. Four factors in the matrix of the framework--publicity, local service, differentiation and participation--together with two dimensions of attracting and delivering were proved to be important…
Descriptors: Data Collection, Government Libraries, Government Publications, Information Services
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Garofalakis, John; Kappos, Panagiotis; Makris, Christos – Internet Research, 2002
Considers the problem of improving the performance of Web access by proposing a reconstruction of the internal link structure of a Web site to match quality of the pages with popularity of the pages. Provides a set of simple algorithms for local reorganization of a Web site, which results in improving users' access to quality pages in an easy and…
Descriptors: Access to Information, Computer System Design, Electronic Text, Hypermedia
Peer reviewed Peer reviewed
Siyal, M. Y.; Barkat, B. – Internet Research, 2002
Presents a framework for enhancing trust in Internet commerce. Shows how trust can be provided through a network of Trust Service Providers (TSp). Identifies a set of services that should be offered by a TSp. Presents a distributed object-oriented implementation of trust services using CORBA, JAVA and XML. (Author/AEF)
Descriptors: Business, Information Industry, Information Networks, Information Services
Peer reviewed Peer reviewed
Rettie, Ruth – Internet Research, 2001
Uses focus groups to facilitate identification and discussion of respondents' Internet experience. Explores respondents' awareness and experience of flow-identified in research as a key characteristic of Internet consumer behavior. Finds half the respondents recognized Internet flow experience and Internet flow seems to prolong Internet and Web…
Descriptors: Computer Mediated Communication, Computer Oriented Programs, Information Technology, Internet
Peer reviewed Peer reviewed
Liao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics
Peer reviewed Peer reviewed
Rowley, Jennifer – Internet Research, 2000
Using trial searches for three best-selling books, this study examined the search facilities offered by shopping bots, which support consumers with the product search and identification stage in e-shopping. Findings indicate that effectiveness of bots not only depends upon search facilities but also upon product coverage, and other added value…
Descriptors: Access to Information, Computer Oriented Programs, Internet, Online Searching
Peer reviewed Peer reviewed
Evans, M. P.; Furnell, S. M. – Internet Research, 2000
Explains the background to experimental work intended to measure aspects of the World Wide Web, which inadvertently caused two perceived security breaches on remote systems. Describes the nature of these incidents and considers why, when over 700,000 addresses were sampled, only two sites considered the activity to be an attempt to breach their…
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Internet
Peer reviewed Peer reviewed
Kolesar, Mark B.; Galbraith, R. Wayne – Internet Research, 2000
Applying a body of theory and empirical research in the study of customer loyalty drivers in the services sector, this paper sets out a number of marketing and Web site design implications for e-retailers. It then suggests several means by which e-retailers can manage customer perceptions to increase sales and develop greater customer loyalty.…
Descriptors: Design, Internet, Marketing, Online Systems
Peer reviewed Peer reviewed
Bontis, Nick; De Castro, Akemi – Internet Research, 2000
Summarizes some key findings of academic papers presented at the First World Congress on the Management of Electronic Commerce (January, 2000, Hamilton, Ontario, Canada). Outlines two meta-management issues that surfaced: taking a strategic approach to Internet ventures and considering infrastructure design during implementation. Highlights…
Descriptors: Administration, Business, Business Education, Conferences
Peer reviewed Peer reviewed
Bell, Hudson; Tang, Nelson K. H. – Internet Research, 1998
A user survey of 60 company Web sites (electronic commerce, entertainment and leisure, financial and banking services, information services, retailing and travel, and tourism) determined that 30% had facilities for conducting online transactions and only 7% charged for site access. Overall, Web sites were rated high in ease of access, content, and…
Descriptors: Banking, Business, Computer Mediated Communication, Financial Services
Peer reviewed Peer reviewed
Internet Research, 1996
Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…
Descriptors: Access to Information, Banking, Competition, Financial Services
Peer reviewed Peer reviewed
Small, Harry – Internet Research, 1996
Because intellectual property law and remedy are set and enforced by individual nations, in the online world, the victim of unlicensed copying has a choice of jurisdiction in enforcing rights. This article defines intellectual property rights and infringement, discusses legislation, and assesses the extent to which right owners can seek redress.…
Descriptors: Intellectual Property, International Law, Internet, Law Enforcement
Previous Page | Next Page ยป
Pages: 1  |  2